【正文】
efficiency in up. Other kind of selection scheme suffer, hopbyhop option spread head oblige clad path last every last node big city get said head field done to. instance, each Router must at dispose IPv6 toe enroll option, therewith differ, IPv6 suffer do with option plus at separate spread head suffer in. top hopbyhop option by definition design to micrometer IP fold (jumbo lotus) in. contain jumbo lotus. Wherefore, this with need for above tight warp ultra each node big city versus option precede inspect to. 14 4. Stream Clad dispose could not so much him WRAPT differ, therefore at any rate, toward their dispose out sail, for Router dispense with versus each toe among enfold height of row imitate dispose among it was unaltered that at IPv6 suffer, versus possession WRAPT approximately parity treat, this purport each WRAPT big city yes by middl。support up The WRAPT demand came in for made an exception of, for not that possession chain circuit big city suffice get those long transmission cell, even Router expect as best as one can keep out of do with they forward to mishandled 39。 efficiency still high done out to by: Said fold station middle Router be incapable of reenter row any subsection in. in conclusion, take out IP head check sum shan39。 predilection 13 so as to IP39。 toe bine be reduce by needs check sum get field the quantity of, these should so as to channel selection 39。multicasting address base these immovability of the address structure bed cleaning in feeding stage of an instars know clearly do with three two bit address space reach up to know clearly 1 two 8bit besides, return versus IP mainframe likely to obtain different type address did know clearly some adjust of the IPv6. IPv6 suffer Cancel know clearly broadcast address whereas instead arbitrary point sow address. IPv6 useful appoint one work interface. 2. Predilection head format Both IPv6 suffer include total length for four 0 syllabic eight words segment (there into two is source address and subsection can but by source node proceed among IPv6 suffer include total length for four 0 syllabic eight words segment (there into two is source address differ with destination address). it and IPv6 toe 39。 at passage mode suffer, ask protective wholly IP fold big city encapsulation to the other one IP data packet liner, at the same time outwards and interior IP head of partment embed one new IPSec head in for. IPSec head big city could at the same time withal transmission mode sum channel mode wrought. Both IPSec structure include a multitude of protocol and algorithm. The correlation as follows station notify of the protocols of partment. IPSec structure includes a large number of agreements and algorithms. These agreements are between the mutual relations. Graph 1: Structural Drawing of IPSec protocols Encapsulating Security Payload(ESP) Esp. supply integrity checking, authentication and encrypt, could set down as with IP data packet super AH it was addressable, therefore in the event of invocation encrypt, then too with concurrent selection know clearly integrity checking and authentication that of, for it endue confidentiality bine preventable distort with. There into, ESP encrypt serve. For in the event of hardly use encryption, IPSec Architecture ESP Protocols Authentication Algorithm Encryption Algorithm AH Protocols Key Management DOI 11 intruder with likely to fake fold withal launch cryptanalytic attack in up. There into, esp. message preamble field include: 1. Security Parameters Index 2. Sequence Number 3. Padding Length 4. Next Header Authentication Header(AH) AH agreement supply data source authentication, data integrity and bob weight sow warrant, it be able to guard correspondence from doctor, therefore be incapable of prevent intercept, fit design to transmission not confidential data up to with IP correspondence. There into, AH message preamble field include: 1. Next Header 2. Length 3. Security Parameters Index 4. Sequence Number 5. Authentication Data IPSec protocol future vista Today, information super highway ratio ever before big city bulk, but it too be confronted with EVERLARGER security menace, hence versus muscle Tnumber suffer every last node hardware security sexual demand in course of on the increase up. It was one postmortem take problem into consideration that but, versus heap work equipments drawing Design whereas character, security. Us need for versus whence, when and on what occasion enrolls safety properties precede reconsider in as well to. For the moment have got three strain primary means could above work hardware equipments enroll security function in. First strain no more will principals means namely treat coherency with one coprocessor importance loaf work processing unit or currency. It was eke one security get base up at the back of work processing unit done out that second strain means. It was should encryption circuit integration at maintain know clearly transfer speed and farthest dam know clearly 12 chip area back with work processing unit analogous chip suffer, thereby at work processing unit suffer join know clearly security function at the same time that third strain means. Wherefore, high integration density should inspire IPSec ‘develop with rush. 3 Follow on IP agreementIPv6 Change of IPv6 Change incarnate infra five importance aspect among IPv6: (1) spread address (2) predigestion head format (3) Tone toward spread and option 39。 security.(six)endue visit list and critical event 39。 MAC address use quantity, establish per port broadcast packet flow threshold, use repose port and VLAN 39。 potential safety hazard, such as both encapsulation attack, broadcast packet attack, MAC waterflooding, spanning tree attack grade second floor attac